What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)A . multiple factor authB . local web authC . single sign-onD . central web authE . TACACS+View AnswerAnswer: B,D
Which action should be taken to accomplish this goal?
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing . Which action should be taken to accomplish this goal?A . Disable telnet using the no ip telnet command.B . Enable the SSH server using the...
Which information is required when adding a device to Firepower Management Center?
Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D
An MDM provides which two advantages to an organization with regards to device management? (Choose two)
An MDM provides which two advantages to an organization with regards to device management? (Choose two)A . asset inventory managementB . allowed application managementC . Active Directory group policy managementD . network device managementE . critical device managementView AnswerAnswer: A,B
What does the API do when connected to a Cisco security appliance?
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . get the process and PID information from the computers in the networkB . create an SNMP pull mechanism for managing AMPC . gather network telemetry information from AMP for endpointsD . gather the...
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
In a PaaS model, which layer is the tenant responsible for maintaining and patching?A . hypervisorB . virtual machineC . networkD . applicationView AnswerAnswer: D
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Security ExploitsB . Common Vulnerabilities and ExposuresC . Common Exploits and VulnerabilitiesD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: B Explanation: Reference: CCNP And CCIE Security Core SCOR...
What provides visibility and awareness into what is currently occurring on the network?
What provides visibility and awareness into what is currently occurring on the network?A . CMXB . WMIC . Prime InfrastructureD . TelemetryView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en_us/about/doing_business/legal/service_descriptions/docs/activethreat-analytics-premier.pdf
What are two rootkit types? (Choose two)
What are two rootkit types? (Choose two)A . registryB . virtualC . bootloaderD . user modeE . buffer modeView AnswerAnswer: C,D Explanation: The term ‘rootkit’ originally comes from the Unix world, where the word ‘root’ is used to describe a user with the highest possible level of access privileges, similar...
Which two preventive measures are used to control cross-site scripting? (Choose two)
Which two preventive measures are used to control cross-site scripting? (Choose two)A . Enable client-side scripts on a per-domain basis.B . Incorporate contextual output encoding/escaping.C . Disable cookie inspection in the HTML inspection engine.D . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...